python3-perf vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the python3-perf package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • M
CVE-2024-27399

<0:4.18.0-553.30.1.el8_10
  • M
CVE-2024-27043

<0:4.18.0-553.30.1.el8_10
  • M
Use After Free

<0:4.18.0-553.30.1.el8_10
  • M
CVE-2024-38564

<0:4.18.0-553.30.1.el8_10
  • M
CVE-2023-52492

<0:4.18.0-553.27.1.el8_10
  • M
Improper Validation of Array Index

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-40984

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-43892

<0:4.18.0-553.27.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.27.1.el8_10
  • M
Race Condition

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-42292

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-40924

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-42244

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-39503

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-35898

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-26924

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-38586

<0:4.18.0-553.27.1.el8_10
  • M
Integer Overflow or Wraparound

<0:4.18.0-553.27.1.el8_10
  • M
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-46826

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-27062

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-38540

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-26976

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-43880

<0:4.18.0-553.27.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-41042

<0:4.18.0-553.27.1.el8_10
  • M
Memory Leak

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-27017

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-40983

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-26851

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-38541

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
NULL Pointer Dereference

<0:4.18.0-553.27.1.el8_10
  • M
Allocation of Resources Without Limits or Throttling

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-35939

<0:4.18.0-553.27.1.el8_10
  • M
Improper Initialization

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2022-48936

<0:4.18.0-553.27.1.el8_10
  • M
CVE-2024-35839

<0:4.18.0-553.27.1.el8_10
  • M
Use After Free

<0:4.18.0-553.27.1.el8_10
  • M
Divide By Zero

<0:4.18.0-553.27.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.22.1.el8_10
  • H
Integer Overflow or Wraparound

<0:4.18.0-553.22.1.el8_10
  • H
Buffer Overflow

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40941

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36919

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2022-48760

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26923

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47338

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41008

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36883

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26720

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47321

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36920

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26880

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47393

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47097

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26769

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52522

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-42322

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47466

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40904

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
Buffer Overflow

<0:4.18.0-553.22.1.el8_10
  • H
Use of Uninitialized Resource

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26717

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35944

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52605

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47287

<0:4.18.0-553.22.1.el8_10
  • H
Excessive Iteration

<0:4.18.0-553.22.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52800

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47383

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47582

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47386

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-38559

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41044

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52476

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-37356

<0:4.18.0-553.22.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.22.1.el8_10
  • H
Buffer Overflow

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40989

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-27042

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-42124

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26855

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41091

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47432

<0:4.18.0-553.22.1.el8_10
  • H
Improper Validation of Array Index

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47497

<0:4.18.0-553.22.1.el8_10
  • H
Use of Uninitialized Resource

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47527

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-38558

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26894

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41064

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47384

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40901

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41035

<0:4.18.0-553.22.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41023

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40988

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40931

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40972

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-43830

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41005

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36953

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52683

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41041

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-38619

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41013

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41007

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40998

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26939

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36939

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40929

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-39499

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26846

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26649

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2022-48754

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35884

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52478

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-40978

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41014

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Read

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35989

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36922

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47412

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41090

<0:4.18.0-553.22.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41065

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47289

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35809

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26638

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47441

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47560

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2022-48619

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47455

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-38579

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-35877

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47385

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-39501

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2022-48836

<0:4.18.0-553.22.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.22.1.el8_10
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-553.22.1.el8_10
  • H
Buffer Overflow

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52840

<0:4.18.0-553.22.1.el8_10
  • H
Improper Check for Unusual or Exceptional Conditions

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26665

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2023-52798

<0:4.18.0-553.22.1.el8_10
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-26645

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-42096

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47352

<0:4.18.0-553.22.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-46984

<0:4.18.0-553.22.1.el8_10
  • H
Allocation of Resources Without Limits or Throttling

<0:4.18.0-553.22.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-42265

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
Use After Free

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2021-47101

<0:4.18.0-553.22.1.el8_10
  • H
Integer Underflow

<0:4.18.0-553.22.1.el8_10
  • H
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:4.18.0-553.22.1.el8_10
  • H
Memory Leak

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-42084

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41056

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-41097

<0:4.18.0-553.22.1.el8_10
  • H
CVE-2024-36006

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26852

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26810

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36017

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-40927

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52658

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26772

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2022-48747

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35824

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-40974

<0:4.18.0-553.16.1.el8_10
  • H
Double Free

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-21823

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26837

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26698

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27025

<0:4.18.0-553.16.1.el8_10
  • H
Race Condition

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52796

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52775

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35938

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27065

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36005

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36896

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52832

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35924

<0:4.18.0-553.16.1.el8_10
  • H
Use of Uninitialized Resource

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-2201

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36020

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52762

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26614

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36927

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47624

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2021-47018

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36016

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52864

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36917

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36945

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36921

<0:4.18.0-553.16.1.el8_10
  • H
Improper Validation of Array Index

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35910

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52486

<0:4.18.0-553.16.1.el8_10
  • H
NULL Pointer Dereference

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52623

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-27395

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35900

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35930

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26686

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35790

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52530

<0:4.18.0-553.16.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.16.1.el8_10
  • H
Improper Locking

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26853

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26925

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35876

<0:4.18.0-553.16.1.el8_10
  • H
Out-of-bounds Write

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26660

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-36954

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-26669

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52648

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35912

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2024-35847

<0:4.18.0-553.16.1.el8_10
  • H
CVE-2023-52777

<0:4.18.0-553.16.1.el8_10